Search results
1 – 10 of 12Brendan M. O’Mahony, Becky Milne and Kevin Smith
Intermediaries facilitate communication with many types of vulnerable witnesses during police investigative interviews. The purpose of this paper is to find out how intermediaries…
Abstract
Purpose
Intermediaries facilitate communication with many types of vulnerable witnesses during police investigative interviews. The purpose of this paper is to find out how intermediaries engage in their role in cases where the vulnerable witness presents with one type of vulnerability, namely, dissociative identity disorder (DID).
Design/methodology/approach
In phase 1, data were obtained from the National Crime Agency Witness Intermediary Team (WIT) to ascertain the demand for intermediaries in DID cases in England and Wales within a three-year period. In phase 2 of this study four intermediaries who had worked with witnesses with DID completed an in-depth questionnaire detailing their experience.
Findings
Referrals for DID are currently incorporated within the category of personality disorder in the WIT database. Ten definite DID referrals and a possible additional ten cases were identified within this three-year period. Registered Intermediary participants reported having limited experience and limited specific training in dealing with DID prior to becoming a Registered Intermediary. Furthermore, intermediaries reported the many difficulties that they experienced with DID cases in terms of how best to manage the emotional personalities that may present.
Originality/value
This is the first published study where intermediaries have shared their experiences about DID cases. It highlights the complexities of obtaining a coherent account from such individuals in investigative interviews.
Details
Keywords
This paper's aim is to examine the interaction between an intermediary, a vulnerable defendant and barristers and the judge in a courtroom. The paper seeks to consider how the…
Abstract
Purpose
This paper's aim is to examine the interaction between an intermediary, a vulnerable defendant and barristers and the judge in a courtroom. The paper seeks to consider how the communication needs of vulnerable defendants, such as those with learning disabilities, should be addressed in the criminal justice system.
Design/methodology/approach
The paper considers the legal landscape for dealing with vulnerable defendants. A case example and court and police interview transcripts are then used to illustrate some of the communication needs of vulnerable people in the criminal justice system.
Findings
The paper highlights the complexities of the language that is used by lawyers in the courtroom and the difficulties that this can cause for a vulnerable defendant. Additionally, this paper reveals the difficulties that the police caution can present to a vulnerable suspect in custody.
Social implications
Vulnerable witnesses or defendants may be disadvantaged in understanding questions and the implications of answers that they provide in a courtroom or in attendance at a police station. The criminal justice system should support these individuals and provide guidance and training to professionals. The author identifies a need for more research in this area.
Originality/value
This is one of the first published papers to examine the interaction between an intermediary, a vulnerable defendant and barristers and the judge in the courtroom. The paper considers how the communication needs of vulnerable defendants should be addressed in the criminal justice system.
Details
Keywords
Brendan M. O'Mahony, Jane Creaton, Kevin Smith and Rebecca Milne
– The purpose of this paper is to find out how intermediaries interpret their role working with vulnerable defendants at court.
Abstract
Purpose
The purpose of this paper is to find out how intermediaries interpret their role working with vulnerable defendants at court.
Design/methodology/approach
In this study six intermediaries who have worked with defendants were interviewed using a semi-structured interview and the interview transcripts were analysed using interpretative phenomenological analysis.
Findings
Intermediaries appeared to be trying to make sense of their developing identities as professionals in the courtroom and this theme is conceptualised through social identity complexity theory.
Practical implications
Health and care professionals undertaking a new function in the criminal justice sector should receive training about the psychological processes underlying developing professional identities. Such training should reduce the cognitive load when they work in the new environment and failure to undertake this training may lead to less efficient practice. Gaining an understanding of their professional positioning within the court environment may assist with retention of intermediaries in this new role.
Originality/value
This is the first published study where intermediaries have been interviewed about their experiences with defendants. Recommendations are made including the requirement for additional training for intermediaries to understand the underlying psychological processes and conflicts they may experience when working with defendant cases.
Details
Keywords
Brendan M. O'Mahony, Kevin Smith and Becky Milne
The purpose of this paper is to examine how Registered Intermediaries are used in the England and Wales to facilitate communication between vulnerable witnesses, victims and…
Abstract
Purpose
The purpose of this paper is to examine how Registered Intermediaries are used in the England and Wales to facilitate communication between vulnerable witnesses, victims and police investigators and criminal courts.
Design/methodology/approach
The paper focuses on the need for early identification of the vulnerable person so that support measures can be put in place from the outset to assist them to provide their testimony.
Findings
It is noted that real progress has been made by the introduction of legislation, specifically the Youth Justice and Criminal Evidence Act (1999), and the uptake by the police service of the subsequent special measures put in place. However, the criminal justice service cannot afford to be complacent as research demonstrates that the police and the courts need to be more effective in managing these issues.
Originality/value
The paper recommends that support measures are widened to include witnesses and suspects being interviewed by the Independent Police Complaints Commission, HM Customs and Revenue, the Department of Health and the Department of Work and Pensions.
Details
Keywords
Damian Gordon, Ioannis Stavrakakis, J. Paul Gibson, Brendan Tierney, Anna Becevel, Andrea Curley, Michael Collins, William O’Mahony and Dympna O’Sullivan
Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of…
Abstract
Purpose
Computing ethics represents a long established, yet rapidly evolving, discipline that grows in complexity and scope on a near-daily basis. Therefore, to help understand some of that scope it is essential to incorporate a range of perspectives, from a range of stakeholders, on current and emerging ethical challenges associated with computer technology. This study aims to achieve this by using, a three-pronged, stakeholder analysis of Computer Science academics, ICT industry professionals, and citizen groups was undertaken to explore what they consider to be crucial computing ethics concerns. The overlap between these stakeholder groups are explored, as well as whether their concerns are reflected in the existing literature.
Design/methodology/approach
Data collection was performed using focus groups, and the data was analysed using a thematic analysis. The data was also analysed to determine if there were overlaps between the literature and the stakeholders’ concerns and attitudes towards computing ethics.
Findings
The results of the focus group analysis show a mixture of overlapping concerns between the different groups, as well as some concerns that are unique to each of the specific groups. All groups stressed the importance of data as a key topic in computing ethics. This includes concerns around the accuracy, completeness and representativeness of data sets used to develop computing applications. Academics were concerned with the best ways to teach computing ethics to university students. Industry professionals believed that a lack of diversity in software teams resulted in important questions not being asked during design and development. Citizens discussed at length the negative and unexpected impacts of social media applications. These are all topics that have gained broad coverage in the literature.
Social implications
In recent years, the impact of ICT on society and the environment at large has grown tremendously. From this fast-paced growth, a myriad of ethical concerns have arisen. The analysis aims to shed light on what a diverse group of stakeholders consider the most important social impacts of technology and whether these concerns are reflected in the literature on computing ethics. The outcomes of this analysis will form the basis for new teaching content that will be developed in future to help illuminate and address these concerns.
Originality/value
The multi-stakeholder analysis provides individual and differing perspectives on the issues related to the rapidly evolving discipline of computing ethics.
Details
Keywords
The purpose of this article is to provide a method of gaining transdisciplinary insight by focusing on keywords in the language we use. The language of economics dominates…
Abstract
Purpose
The purpose of this article is to provide a method of gaining transdisciplinary insight by focusing on keywords in the language we use. The language of economics dominates discourse about the economy. Analyzing this discourse from a great variety of perspectives has blossomed but promises much more. The study of the keyword “entrepreneur” illustrates the strengths and weaknesses of this diversity of perspectives, and also points to some possible opportunities for enhancing the quality of their interaction.
Design/methodology/approach
A broad discourse analytic approach is drawn upon to understand the role the language of mainstream economics plays in our discussions of the economy, to trace the keyword “entrepreneur” as it has been and is used in economics and more general conversations about the economy and to use a keyword approach to create a transdisciplinary understanding of the way the economy is discussed.
Findings
Economics in the sense of the mainstream approach that adopts the rational narrowly self-interested, calculating and decontextualized individual as its default assumption is a very particular language that has detrimentally dominated discussions of the economy. “Entrepreneur” is a keyword, the use of which in economics has both strengthened and put constraints on the way it can be deployed in talking about the economy. Focusing on keywords in the language, we use can provide a method of gaining transdisciplinary insight.
Research limitations/implications
A short article with such a broad sweep such as this no doubts illustrates the limits imposed by attempts at transdisciplinary communication, but a potential gain from any such interaction is that we might grow to have more informed and genuinely dialogic interactions about the economy. As another way to attempt communication across diverse positions, looking at keywords in the discourse about the economy seems profitable.
Social implications
Discourses of economics and the entrepreneur play a huge role in how people construct their roles and representations in the economy. Producing critical and creative understandings of these discourses that allow social actors to benefit from the diversity of completed and potential research work seems imperative in a world facing our current economic and social problems.
Originality/value
Discourse analysis of the economy, the entrepreneur and economics has produced many insights but these insights have remained stranded in intellectual niches. As studies of language and the economy continue to blossom this article stresses the need, and points to some opportunities, for more fruitful interaction, by adopting a keyword approach.
Details
Keywords
Neha Chhabra Roy and Sreeleakha Prabhakaran
The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian…
Abstract
Purpose
The study aims to overview the different types of internal-led cyber fraud that have gained mainstream attention in recent major-value fraud events involving prominent Indian banks. The authors attempted to identify and classify cyber frauds and its drivers and correlate them for optimal mitigation planning.
Design/methodology/approach
The methodology opted for the identification and classification is through a detailed literature review and focus group discussion with risk and vigilance officers and cyber cell experts. The authors assessed the future of cyber fraud in the Indian banking business through the machine learning–based k-nearest neighbor (K-NN) approach and prioritized and predicted the future of cyber fraud. The predicted future revealing dominance of a few specific cyber frauds will help to get an appropriate fraud prevention model, using an associated parties centric (victim and offender) root-cause approach. The study uses correlation analysis and maps frauds with their respective drivers to determine the resource specific effective mitigation plan.
Findings
Finally, the paper concludes with a conceptual framework for preventing internal-led cyber fraud within the scope of the study. A cyber fraud mitigation ecosystem will be helpful for policymakers and fraud investigation officers to create a more robust environment for banks through timely and quick detection of cyber frauds and prevention of them.
Research limitations/implications
Additionally, the study supports the Reserve Bank of India and the Government of India's launched cyber security initiates and schemes which ensure protection for the banking ecosystem i.e. RBI direct scheme, integrated ombudsman scheme, cyber swachhta kendra (botnet cleaning and malware analysis centre), National Cyber Coordination Centre (NCCC) and Security Monitoring Centre (SMC).
Practical implications
Structured and effective internal-led plans for cyber fraud mitigation proposed in this study will conserve banks, employees, regulatory authorities, customers and economic resources, save bank authorities’ and policymakers’ time and money, and conserve resources. Additionally, this will enhance the reputation of the Indian banking industry and extend its lifespan.
Originality/value
The innovative insider-led cyber fraud mitigation approach quickly identifies cyber fraud, prioritizes it, identifies its prominent root causes, map frauds with respective root causes and then suggests strategies to ensure a cost-effective and time-saving bank ecosystem.
Details